| Version | Supported |
|---|---|
| 0.3.x | ✅ |
| 0.2.x | ✅ |
This policy covers all crates in the a2a-rust workspace, including but not limited to the core protocol types, server, and client libraries.
If you discover a security vulnerability in this project, please report it responsibly. Do not open a public GitHub issue.
- Email: Send a detailed report to security@a2a-rust.dev.
- GitHub Security Advisories: Open a draft advisory at https://github.com/tomtom215/a2a-rust/security/advisories/new.
PGP encryption for security reports is not yet available. For now, please send reports in plain text to the email address above.
- Description of the vulnerability and its potential impact.
- Steps to reproduce or a minimal proof of concept.
- Affected crate(s) and version(s).
- Any suggested fix, if available.
We follow a 90-day coordinated disclosure timeline:
- Day 0 -- Report received; we acknowledge within 3 business days.
- Day 1-14 -- We triage the issue, confirm validity, and assess severity.
- Day 15-90 -- We develop and test a fix, coordinating with the reporter.
- Day 90 -- Public disclosure, with a CVE identifier if applicable.
If a fix requires more time, we will negotiate an extension with the reporter. We aim to release a patch as quickly as possible, ideally well before the 90-day deadline.
We gratefully credit reporters in release notes and security advisories (unless anonymity is requested).